Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2024, 20:55
Behavioral task
behavioral1
Sample
fae509cf75e2695f28d608c2c3b59977_JaffaCakes118.dll
Resource
win7-20240903-en
4 signatures
150 seconds
General
-
Target
fae509cf75e2695f28d608c2c3b59977_JaffaCakes118.dll
-
Size
11KB
-
MD5
fae509cf75e2695f28d608c2c3b59977
-
SHA1
ada26a21a0d677e1940204c70197e20ceb62c410
-
SHA256
0d6617b63144a824bc6963b77bf389c9b9865171e3b9083071cc0a159f5ff7bc
-
SHA512
8bcde12c9fb12c7513c15857bf3ea5b5950e353b0df4eecdb4a485724a7808068f47b218bacd2c02ef14090b3c8a7d7b54f38118127c578b703f9893f0642697
-
SSDEEP
192:nrX9bwo19+2GOFvLPQYpRBgo87mzXXPVLaOKo4FcAeeBAc7N:Bbv9+27pRuV+FdR4Fhecp
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4464-1-0x00000000005F0000-0x00000000005FE000-memory.dmp upx behavioral2/memory/4464-0-0x00000000005F0000-0x00000000005FE000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4464 rundll32.exe 4464 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2972 wrote to memory of 4464 2972 rundll32.exe 82 PID 2972 wrote to memory of 4464 2972 rundll32.exe 82 PID 2972 wrote to memory of 4464 2972 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fae509cf75e2695f28d608c2c3b59977_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fae509cf75e2695f28d608c2c3b59977_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4464
-